共 69 条
[32]
Luo H, 2004, J IMAGE GRAPHICS, V10, P79, DOI 10.013
[33]
Makhzani Alireza, 2015, arXiv
[34]
Least Squares Generative Adversarial Networks
[J].
2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV),
2017,
:2813-2821
[35]
Miller VS, 1985, C THEOR APPL CRYPT T, DOI [DOI 10.1007/3-540-39799-X_31, DOI 10.1007/3-540-39799-X31]
[37]
Pellegrini A, 2010, DES AUT TEST EUROPE, P855
[38]
A new class of scrambling transformation and its application in the image information covering
[J].
SCIENCE IN CHINA SERIES E-TECHNOLOGICAL SCIENCES,
2000, 43 (03)
:304-312
[39]
Research on Face Image Encryption Based on Deep Learning
[J].
2018 4TH INTERNATIONAL CONFERENCE ON ENVIRONMENTAL SCIENCE AND MATERIAL APPLICATION,
2019, 252
[40]
Tanaka M., 2018, Em: 2018 IEEE International Conference on RFID Technology Application (RFID-TA), P1, DOI DOI 10.1109/ICCE-CHINA.2018.8448772